Skip to content

Commit d9a2211

Browse files
authored
Merge pull request #95831 from juntakata/patch-15
Remove references to per-user MFA
2 parents c3da21f + 43a8ac3 commit d9a2211

File tree

1 file changed

+1
-23
lines changed

1 file changed

+1
-23
lines changed

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 1 addition & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -230,9 +230,6 @@ You can enforce Conditional Access policies, such as multifactor authentication
230230
>
231231
> Remote desktop using Windows Hello for Business authentication is available only for deployments that use a certificate trust model. It's currently not available for a key trust model.
232232
233-
> [!WARNING]
234-
> The per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting is not supported for the Azure Windows VM Sign-In app.
235-
236233
## Log in by using Azure AD credentials to a Windows VM
237234

238235
> [!IMPORTANT]
@@ -396,31 +393,12 @@ You might see the following error message when you initiate a remote desktop con
396393

397394
![Screenshot of the message that says the sign-in method you're trying to use isn't allowed.](./media/howto-vm-sign-in-azure-ad-windows/mfa-sign-in-method-required.png)
398395

399-
If you've configured a Conditional Access policy that requires MFA before you can access the resource, you need to ensure that the Windows 10 or later PC that's initiating the remote desktop connection to your VM signs in by using a strong authentication method such as Windows Hello. If you don't use a strong authentication method for your remote desktop connection, you'll see the error.
396+
If you've configured a Conditional Access policy that requires MFA or legacy per-user Enabled/Enforced Azure AD MFA before you can access the resource, you need to ensure that the Windows 10 or later PC that's initiating the remote desktop connection to your VM signs in by using a strong authentication method such as Windows Hello. If you don't use a strong authentication method for your remote desktop connection, you'll see the error.
400397

401398
Another MFA-related error message is the one described previously: "Your credentials did not work."
402399

403400
![Screenshot of the message that says your credentials didn't work.](./media/howto-vm-sign-in-azure-ad-windows/your-credentials-did-not-work.png)
404401

405-
> [!WARNING]
406-
> The legacy per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting is not supported for the Azure Windows VM Sign-In app. This setting causes sign-in to fail with the "Your credentials did not work" error message.
407-
408-
You can resolve the problem by removing the per-user MFA setting through these commands:
409-
410-
```
411-
412-
# Get StrongAuthenticationRequirements configure on a user
413-
(Get-MsolUser -UserPrincipalName [email protected]).StrongAuthenticationRequirements
414-
415-
# Clear StrongAuthenticationRequirements from a user
416-
$mfa = @()
417-
Set-MsolUser -UserPrincipalName [email protected] -StrongAuthenticationRequirements $mfa
418-
419-
# Verify StrongAuthenticationRequirements are cleared from the user
420-
(Get-MsolUser -UserPrincipalName [email protected]).StrongAuthenticationRequirements
421-
422-
```
423-
424402
If you haven't deployed Windows Hello for Business and if that isn't an option for now, you can configure a Conditional Access policy that excludes the Azure Windows VM Sign-In app from the list of cloud apps that require MFA. To learn more about Windows Hello for Business, see [Windows Hello for Business overview](/windows/security/identity-protection/hello-for-business/hello-identity-verification).
425403

426404
> [!NOTE]

0 commit comments

Comments
 (0)